🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • 📒Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • 🕸️WEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • 👩‍💻CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • 🔹Powershell
  • 🔴Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • 🔐Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  1. Crypto & AI/ML
  2. Crypto & Blockchain
  3. Blockchain Security
  4. Mining-Risks

4.2 Proof of Stake Post Merge Ethereum

Proof of Stake Post Merge (Ethereum 2.0)

Proof of Stake (PoS) is an alternative to Proof of Work. In PoS, instead of using computational power to mine blocks, participants "stake" their cryptocurrency as collateral in order to participate in the validation of transactions and block creation. Ethereum’s transition to Ethereum 2.0, which occurred after the Merge, shifted from PoW to PoS.

  • Process: In PoS, validators are chosen to create new blocks and validate transactions based on the amount of cryptocurrency they have staked, rather than on their computational power. Ethereum’s new consensus mechanism is called Casper, which uses staking to ensure network security.

  • Post-Merge Ethereum:

    • More energy-efficient: PoS is much less energy-intensive than PoW because it does not require massive amounts of computational work.

    • Staking rewards: Validators earn rewards for participating in the consensus mechanism by staking their ETH. The rewards are proportional to the amount of ETH they stake.

    • Security: The security of the network is now reliant on the total amount of ETH staked, and attackers would need to own a large portion of the total ETH supply to compromise the network.

  • Impact of the Merge: Ethereum’s shift to PoS aims to address PoW's environmental concerns while also increasing scalability and security. PoS also allows for staking pools, where multiple users can pool their staked tokens to participate in the validation process and receive rewards.

Previous4.1 Mining OverviewNext4.3 Crypto Mining Malware (Cryptojacking)

Last updated 6 months ago

🔐